vulnerability

Amazon Linux 2023: CVE-2022-34903: Medium priority package update for gnupg2

Severity
6
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:N)
Published
Jun 30, 2022
Added
Feb 17, 2025
Modified
Jul 9, 2025

Description

GnuPG through 2.3.6, in unusual situations where an attacker possesses any secret-key information from a victim's keyring and other constraints (e.g., use of GPGME) are met, allows signature forgery via injection into the status line.
A vulnerability was found in GnuPG. This issue occurs due to an escape detection loop at the write_status_text_and_buffer() function in g10/cpr.c. This flaw allows a malicious actor to bypass access control.

Solutions

amazon-linux-2023-upgrade-gnupg2amazon-linux-2023-upgrade-gnupg2-debuginfoamazon-linux-2023-upgrade-gnupg2-debugsourceamazon-linux-2023-upgrade-gnupg2-minimalamazon-linux-2023-upgrade-gnupg2-minimal-debuginfoamazon-linux-2023-upgrade-gnupg2-smimeamazon-linux-2023-upgrade-gnupg2-smime-debuginfo
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.